Skip to main content
Share
Favorite

239
RESULTS

movies 219
texts 16
audio 4
COLLECTION
TOPIC
OpenSecurityTraining.info 170
Reverse Engineering 132
Classes 123
Education 123
Multi-day-class 123
Multi-day-training 123
Technology 123
Training 123
Computer Security 122
IA32 121
Security 120
Computers 111
Intel 111
x86 111
Computer 110
Computer security class 98
Cyber Security 98
CyberSecurity 98
Host Security 98
Intel x86 96
reverse engineering 88
Malware 64
Malware Analysis 64
IDA 61
Debugging 60
Disassembly 60
IDA Pro 60
PE 50
security 50
computer 48
computer security 48
classes 47
computer security class 47
computers 47
cyber security 47
education 47
host security 47
multi-day-class 47
multi-day-training 47
training 47
API Tracing 38
AutoRuns 38
Behavioral Analysis 38
CuckooBox 38
DLL Injection 38
Dynamic Analysis 38
File Identification 38
Malware Dynamic Analysis 38
Malware Maneuvering 38
Malware Persistence 38
Malware Sandbox 38
Malware Terminology 38
Networking 38
Poison Ivy RAT 38
Portable Executable 38
ProcMon 38
Process Monitor 38
RegShot 38
VirtualBox 38
Win32Override 38
Windows Libraries 38
Windows Processes 38
Windows Registry 38
Windows Services 38
Wireshark 38
YARA 38
disassembly 35
malware 28
Recon 27
Static Analysis 27
ASLR 25
Address Space Layout Randomization 25
DEP 25
Exploits 25
SEH 25
buffer overflows 25
debugging 25
smashing the stack 25
software vulnerabilities 25
Conference 20
Montreal 19
Data Execution Prevention 13
SEHOP 13
SafeSEH 13
Vulnerabilities 13
bypassing ASLR 13
bypassing DEP 13
fuzzer 13
fuzzing 13
hacking 13
interrupts 13
memory management 13
paging 13
port IO 13
rootkits 13
segmentation 13
structured exception handling 13
DOS Header 12
EAT 12
Export Address Table 12
File Header 12
IAT 12
IAT hooking 12
Import Address Table 12
Import Address Table hooking 12
Optional Header 12
PE/COFF 12
Portable Executable format 12
Section Header 12
Structured Exception Handlers 12
Structured Exception Handling 12
TLS 12
Thread Local Storage 12
UPX 12
WinDbg 12
Windows PE 12
Windows executable 12
abstract assembly tree 12
abstract syntax tree 12
binaries 12
binary executable format 12
binary format 12
bound imports 12
compilation 12
compiler 12
compiling 12
computer virus 12
computer viruses 12
concrete syntax tree 12
context free grammars 12
data execution prevention 12
debugger 12
delayed imports 12
ebp overwrite 12
exports 12
forwarded exports 12
heap overflows 12
import by name 12
import by ordinal 12
imports 12
lexing 12
linker 12
linking 12
load configuration 12
packers 12
packing 12
parse tree 12
parsing 12
relocatable code 12
relocations 12
resources 12
runtime imports 12
signed code 12
tokenizing 12
x86 assembly 12
ARM 11
Acorn RISC Machine 11
Advanced RISC Machine 11
assembly 11
cybersecurity 11
physical memory 10
virtual memory 10
REVERSE ENGINEERING 6
Recon 2010 6
COMPUTER PROGRAMMING 5
Recon 2013 4
ADA (PROGRAMMING LANGUAGE) 3
Recon,Security,Reverse Engineering,Conference 3
SOFTWARE ENGINEERING 3
algorithm 3
css 3
decss 3
dvd 3
malware analysis 3
malware analysis primer 3
reverse 3
ALGORITHMS 2
CONTROL SYSTEMS DESIGN 2
DATA PROCESSING 2
Hardware 2
MAINTENANCE 2
OHM2013 2
Unpacking 2
boot rom 2
circuit board 2
engineering 2
flash rom 2
front panel 2
hard drive 2
hardware 2
power 2
power supply 2
rom 2
solder 2
soldering 2
soldering iron 2
xbox 2
xbox motherboard 2
xbox security 2
2006 1
CREATOR
SHOW DETAILS